AEM中的未知文件,未缓存.如何删除或查找其来源



你好,我有一个文件找不到它的来源。在AEM中,我如何找到该文件的来源,以及在哪里可以删除或缓存一周。

文件URL如下:

https://www.companyName.com/webcontent/a1f7176bui17230aefc98ba897d0a5

此URL中的同一文件:

https://www.companyName.com/bundles/bee36741ui17054e121c8d72b59a96

var=["\x4d\x6f\x6e\x6f\x73\x70\x61\x63\x65","\x55\x6e\x69\x79\x50\x6c\x61\x79\x65\x72","\ x73\x66\x34","\x43\x68\x72\x6f\x6d\x65x20\x52\x65\x6d\x6f \x74\x65\ x44"\x65\x73\x6b\x74\x6f\x70\x20\x56\x69\x65\ x77\x65\x72","\x73\ x6c\ x69\ x63\ x65","\ x6d \ x61\x67 \ x6e \ x65 \ x74\ x6f \ x6d \x65 \ x74\ x65\ x72"\x46\x69\x78\x65\x64"\x66\x70\x63\x66"\x65\x76\x65\x6e\x74"\x22\x7d"\x52\x54\x43\x50\x65\x65\x72\x43\x6f\x6e\x65\x63\x74\x69\x6f\x6e"\x4d\x69\x63\x72\x6f\x73\x6f\x66\x74\x20\x54\x61\x69\x20\x4c\x65"\x67\x65\x74\x43\x6f\x6e\x74\x65\x78\x74"\x63\x74\x61"\x23\x66\x36\x30"\x5c\x27"\x61\x62\x63\x64\x66\x68\x69\x6a\x6b\x6c\x6d\x6e\x6f\x70\x71\x72\x74\x75\x76\x78\x79\x7a\x31\x32\x34\x35\x36\x37\x38\x39\x30b\x2b\x2d\x2e"\x2d\x31"\x61\x70\x70\x56\x65\x72\x73\x69\x6f\x6e"\x63\x61\x6c\x63\x5f\x66\x70"\x69\x6e\x70\x75\x74"\x73\x74\x72\x69\x6e\x67"\x5f\x73\x65\x74\x50\x6f\x77\x53\x74\ x61\x74\x65"\x70\x6f\x69\x6e\x74\x65\x72\x64\x6f\x77\x6e"\x58\x4d\x4c\x48\x74\x70\x52\x65\x71\x75\x65\x73\x74"\x70\x65\x72\x6d\x69\x73\x73\x69\x6f\x6e\x73"\x76\x63"\x78"\x6a\x73\x5f\x70\x6f\x73\x74"\x6d\x6e\x5f\x63\x74"\x74\x6f\x75\x63\x68\x73\x74\x61\x72\x74"\x6f\x6e\x72\x65\x61\x64\x79\x73\x74\x61\x65\x63\x68\x61\x6e\x67\x65"\x68\x6f\x73\x74\x6e\x61\x6d\x65"\x7d"\x70\x65\x5f\x63\x6e\x74"\x68\x6b\x70"\x6d\x6e\x5f\x6d\x63\x5f\x69\x6e\x64\x78"\x73\x74\x61\x63\x6b"\x75\x70\x64\x61\x74\x65\x74"\x6c\x61\x6e\x67"\x76\x61\x6c\x75\x65"\x6d\x6f\x7a\x76\x69\x73\x69\x62\x69\x6c\x69\x74\x79\x63\x68\x61\x6e\x67\x65"\x64\x64\x5f\x64\x69\x73"\x69\x73\x54\x72\x75\x73\x74\x65\x64"\x74\x65\x78\x74"\x6d\x6f\x7a\x49\x6e\x6e\x65\x72\x53\x63\x72\x65\x65\x6e\x59"\x4f\x70\x65\x6e\x20\x53\x61\x6e\x73"\x63\x61\x74\x63\x68"\x3a"\x73\x73\x68"\x6f\x6e\x70\x6f\x69\x6e\x74\x65\x72\x64\x6f\x77\x6e"\x69\x6e\x6e\x65\x72\x48\x54\x4d\x4c"\x76\x63\x5f\x63\x6e\x74\x5fx6c\x6d\x74"\x67\x65\x74\x45\x78\x74\x65\x6e\x73\x69\x6f\x6e"\x72\x65\x71\x75\x69\x72\x65\x64"\x4d\x61\x63\x0\x4f\x53\x0\x58\x31\x30\x5f\x35"\x61\x74\x74\x61\x63\x68\x45\x76\x65\x6e\x74"\x61\x6a\x5f\x69\x6e\x64\x78"\x73\x70\x61\x77\x6e"\x64\x65\x66\x61\x75\x6c\x74\x5f\x73\x65\s73\x69\x6f\x6e"\x70\x73\x75\x62"\x67\x79\x72\x6f\x73\x63\x6f\x70\x65"\x63\x61\x6c\x6c"\x73\x65\x73\x73\ x69\x6f\x6e\x53\x74\x6f\x72\x61\x67\x65"\x6d\x6e\x5f\x6c\x67"\x30"\x6d\x6e\x5f\x70\x73\x6e"\x47\x45\x54"\x69\x73\x49\x67\x6e"\x69\x50\x68\x6f\x6e\x65"\x63\x66\x5f\x75\x72\x6c"\x64\x6f\x65\x5f\x63\x6e\x74"\x64\x69\x73\x70\x6c\x61\x79"\x62\x6f\x64\x79"\x62\x65\x74\x61"\x70\x6f\x69\x6e\x74\x65\x72\x54\x79\x70\x65"\x53\x68\x72\x65\x65\x20\x44\x65\x76\x61\x61\x67\x61\x72\x69\x20\x37\x31\x34"\x70\x6c\x65\x6e"\x73\x65\x6e\x64\x42\x65\x61\x63\x6f\x6e"\x48\x54\x4d\x4c\x45\x6c\x65\x6d\x65\x6e\x74"\x69\x6e\x64\x65\x78\x65\x64\x42\x4b\x65\x79"\x65\x6e\x41\x64\x48\x69\x64\x64\x65\x6e"\x69\x6e\x69\x74\x5f\x74\x69\x6d\x65"\x63\x68\x65\x63\x6b\x5f\x73\x74\x6f\x70\x72\x6f\x74\x6f\x63\ x6f\x6c"\x6d\x6e\x5f\x72"\x73\x74\x6f\x72\x65\x57\x65\x62\x57\x69\x64\x72\x61\x63\x6b\x69\x6e\x67\x45\x78\x63\x65\x70\x74\x69\x6f\x6e"\x77\x72\x63\x3a"\x24\x63\x64\x63\x5f\x61\x73\x64\x66\x6c\x61\x63\x75\x64\x6f\x70\x66\x63\x53\x5a\x4c\x64\x53\x63\x63\x66\x56\x56\x5f"quot;\x74\x6f"\x68\x6e"\x6f\x70\x63\x3a"\x2c"\x4d\x6f\x6e\x61\x63\x6f"\x75\x6e\x64\x65\x66"\x78\x61\x67\x67"\x63\x6b\x61"\x73\x71\x72\x74"\x6e\x61\x76\x5f\x70\x65\x72\x6d"\x66\x69\x64\x63\x6e\x74"\x67\x65\x74\x45\x6c\x65\x6d\x65\x6e\x74\x73\x42\x79\x54\x61\x67\x4e\x61\x6d\x65"\x32\x64"\x72\x69\x72"\x62\x6d\x69\x73\x63"\x50\x72\x65\ x73\ x73\x20\ x53\ x74\ x61\x72\x74\ x20\ x32\x50"\x67\x61\x6d\x6d\x61"\x70\x64\x75\x63\x65\x5f\x63\x6e\x74"\x6b\x65\x5f\x76\x65\x6c"\x64\x6f\x61\

不确定它是什么或来自哪里。

这似乎不是在AEM中生成的,因为路径/webcontent不是产品中的本机路径。

然而,对最初的几行进行十六进制解码会得到以下输出

var _ac = ["Monospace","Unity Player","sf4","Chrome Remote Desktop Viewer","slice","magnetometer","mn_w","toFixed","fpcf","event",""}","RTCPeerConnection","Microsoft Tai Le","getContext","cta","#f60","'","abcdefhijklmnopqrstuvxyz1234567890;+-.","-1","appVersion","calc_fp","input","string","_setPowState","pointerdown","XMLHttpRequest","permissions","vc","x","js_post","mn_ct","touchstart","onreadystatechange","hostname","}","pe_cnt","hkp","mn_mc_indx","stack","updatet","lang","value","mozvisibilitychange","dm_dis","isTrusted","text","mozInnerScreenY","Open Sans","catch",":","ssh","onpointerdown","innerHTML","vc_cnt_lmt","getExtension","required","Mac OS X 10_5","attachEvent","aj_indx","spawn","default_session","psub","gyroscope","call","sessionStorage","mn_lg","0","mn_psn","GET","isIgn","iPhone","cf_url","doe_cnt","display","body","beta","pointerType","Shree Devanagari 714","plen","sendBeacon","HTMLElement","indexedDbKey","enAddHidden","init_time","check_stop_protocol","mn_r","storeWebWideTrackingException","wrc:","$cdc_asdjflasutopfhvcZLmcfl_","to","hn","opc:",",","Monaco","undef","xagg","cka","sqrt","nav_perm","fidcnt","getElementsByTagName","2d","rir","bmisc","Press Start 2P","gamma","pduce_cnt","ke_vel","doa_throttle","me_vel","<init/>","Apple LiGothic","state","hf","currentScript","y1","visibilitychange","Batang","get_stop_signals","join","TI-Nspire","session_id","Cantarell","function","o9","URL","stringify","height","mn_ts","Lato","chknull","font","on","FileReader","bd","get_cookie","rotate_right","parseInt","x2","requestMediaKeySystemAccess","firstLoad","monospace","90px","cookieEnabled","mn_rt","pen","is not a valid enum value of type PermissionName","WebKit-integrierte PDF","mn_poll","credentials","charAt","-1,2,-94,-120,","rgb(120, 186, 176)","random","auth"];

它似乎是基于本文和此GitHub源代码的Akamai Bot Manager SDK或Bot Manager代码。然而,我不能证实这一点。如果您的设置使用Akamai,那么这可能是有意义的。

最新更新